z/OS DFSMSrmm Diagnosis Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Finding the module name in a dump

z/OS DFSMSrmm Diagnosis Guide
SC23-6876-00

You can use a dump to identify the name of the module in control when a failure occurred.

  1. Find the program status word (PSW) in the dump. The instruction address is the last 31 bits of the PSW. In Figure 1 the last 31 bits of the PSW, 000085C4, are the instruction address.
    Figure 1. Finding the address of the error
    JOB S1REP001         STEP AUDREPT         TIME 123515   DATE 92281    ID = 000    CPUID = FF0158243090   PAGE 00000001
    COMPLETION CODE      SYSTEM = 0C4      REASON CODE = 00000010
     
      PSW AT ENTRY TO ABEND   078D2000  000085C4  ILC  04  INTC  0010
     
    PSW LOAD MODULE = EDGAUD    ADDRESS = 000085C4  OFFSET = 00000214
     
     ASCB: 00F97280
              +0000  ASCB..... ASCB      FWDP..... 00FBBD00  BWDP..... 00FBDB00  CMSF..... 00F51180  SVRB..... 008FF960
              +0014  SYNC..... 000036F9  IOSP..... 00000000  TNEW..... 008E3D90  CPUS..... 00000001  ASID..... 0010
              +0026  R026..... 0000      LL5...... 00        HLHI..... 01        DPHI..... 00        DP....... 85
              +002C  TRQP..... 80FD51E1  LDA...... 7FF15EB0  RSMF..... 00        R035..... 0000      TRQI..... 41
              +0038  CSCB..... 05395960  TSB...... 00000000  EJST..... 0000000A  50995600
              +0048  EWST..... A6686CCD  5A1FFD11            JSTL..... 000007D3  ECB...... 808FFE58  UBET..... A6684BE2
              +005C  TLCH..... 00000000  DUMP..... 008FF418  AFFN..... FFFF      RCTF..... 00        FLG1..... 00
              +0068  TMCH..... 00000000  ASXB..... 008FE038  SWCT..... A8D6      DSP1..... 00        FLG2..... 00
              +0074  RSV...... 0000      SRBS..... 0000      LLSQ..... 00000000  RCTP..... 008FE240  LOCK..... 00000000
              +0084  LSQH..... 00000000  QECB..... 00000000  MECB..... 40000000  OUCB..... 01C746F8  OUXB..... 01C70C28
              +0098  FMCT..... 0000      LEVL..... 03        FL2A..... 00        XMPQ..... 00000000  IQEA..... 00000000
              +00A4  RTMC..... 00000000  MCC...... 00000000  JBNI..... 00FA0DC4  JBNS..... 00FA0B18  SRQ1..... 00
  2. Obtain the abend address by subtracting the instruction length code (ILC) from the instruction address.
                   000085C4       instruction address
                   -      4       instruction length code
                   ________
                   000085C0       abend address
  3. Go to the abend address and scan backward until you find the module name in the comment section or eyecatcher of the dump. The module name is EDGname where EDG is the DFSMSrmm identifier and name is the module name suffix. In Figure 2, the module name is EDGAUD.
Figure 2. Finding the module name
000083A0 00000000 00000000 00000000 00000000 47F0F138 2BC5C4C7 C1E4C440 4040F1F0   *.................01..EDGAUD   10*
000083C0 61F0F561 F9F2E5F0 F1D9F0F1 D4F0F040 D1C4E9F1 F1F5F040 D5D6D5C5 40404040   */05/92V01R02M00 JDZ11B4 NONE    *
000083E0 C1D3D340 D9C9C7C8 E3E240D9 C5E2C5D9 E5C5C440 40404040 40404040 40404040   *ALL RIGHTS RESERVED             *
00008400 40404040 40404040 40404040 F5F6F9F5 60C4C6F1 404DC35D 40C3D6D7 E8D9C9C7   *            5647-A01 ©   COPYRIG*
00008420 C8E340C9 C2D440C3 D6D9D74B 40F1F9F7 F96B40F1 F9F9F340 D3C9C3C5 D5E2C5C4   *HT IBM CORP. 1979, 2000 LICENSED*
00008440 40D4C1E3 C5D9C9C1 D3406040 D7D9D6C7 D9C1D440 D7D9D6D7 C5D9E3E8 40D6C640   * MATERIAL - PROGRAM PROPERTY OF *
00008460 C9C2D440 E4E240C7 96A58599 95948595 A340E4A2 8599A240 D985A2A3 998983A3   *IBM US GOVERNMENT USERS RESTRICT*
00008480 858440D9 898788A3 A2406040 40404040 E4A28540 84A49793 898381A3 89969540   *ED RIGHTS -     USE DUPLICATION *
000084A0 96994084 89A28393 96A2A499 85409985 A2A39989 83A38584 4082A840 C7E2C140   *OR DISCLOSURE RESTRICTED BY GSA *
000084C0 C1C4D740 E2838885 84A49385 40C39695 A3998183 A340A689 A38840C9 C2D440C3   *ADP SCHEDULE CONTRACT WITH IBM C*
000084E0 9699974B 40000000 90ECD00C 18CF41AC 0FA04120 A4105020 D00850D0 200418D2   *ORP. .....}.........U.&}.&}...K*
00008500 58910000 4510C15C 8F0097F0 0A139110 A4D04780 A1400700 4510C170 8F009850   *.J....A*..P0..J.U}... ....A...Q.*
00008520 0A139110 A5304780 A1740700 4100C184 47F0C18C 40404040 40404040 1B110A08   *..J.V.........AD.0A........ ....*
00008540 5000A3E0 4100C19C 47F0C1A4 4040404  40404040 1B110A08 5000A3E4 4100C1B4   *&T\..A..0AU....... ....&TU..A.*
00008560 47F0C1BC 40404040 40404040 1B110A08 5000A3E8 4100C1CC 47F0C1D4 40404040   *.0A........ ....&TY..A..0AM....*
00008580 C1D9E240 1B110A08 5000A3EC 4100C1E4 47F0C1EC 40404040 40404040 1B110A08   *... ....&T...AU.0A........ ....*
000085A0 5000A3F0 4100C1FC 47F0C204 E2D6D9E3 40404040 1B110A08 5000A3F4 4110A73A   *&T0..A..0B.SORT    ....&T4..X.*
000085C0 4100A748 0A1812FF 4770C29C D407A748 A7484780 C29C0700 4510C230 800098B0   *..X.......B.M.X.X...B.....B...Q.*
000085E0 0A139110 A5904780 A1E44130 00044140 A9504110 A56058F1 00300CEF D2474000   *..J.V....U..... Z&.V-.1....K. .*

If your dump is in one of the system dump data sets, display the titles of the dump data sets to find the dump number.

  1. Enter the system command:
     DISPLAY DUMP,TITLE
  2. Then enter the system command:
     DISPLAY DUMP,ERRDATA,DSN=xx
    where xx is the dump number to display this output as shown in Figure 3:
    Figure 3. Sample dump output
      DUMP03 TITLE=EDGQMGR TRAPPED ABEND S0C4 U0000 AT 82C48534 IN
                  MODULE EDGQMGR , OFFSET 00029C.
         DUMP TAKEN TIME=08.36.51 DATE=02/02/93
         ERRORID=SEQ00196 CPU0000 ASID002A TIME=08.36.51
         SYSTEM ABEND CODE=0C4  REASON CODE=0010
         MODULE=EDGQMGR  CSECT=********
         PSW AT TIME OF ERROR=070C0000 82C48534 ILC=6 INT=10
         TRANSLATION EXCEPTION ADDR=C3C5C542
         ABENDING PROGRAM ADDR=02C48298 RECOVERY ROUTINE=********
         GPR 0-3   00000000  00000002  00004080  02BD7008
         GPR 4-7   02CAC000  02C12EA0  02C287F8  02CB9FE8
         GPR 8-11  02C00A98  00008540  00008540  00F97678
         GPR12-15  82C48298  02C12EA0  0000002A  C3C5C540
  3. Inspect the title to obtain the module name, CSECT name, PSW, and, in some cases the offset.

You can also use IPCS output to obtain the module and offset. In Figure 4, the module name is EDGBKUP and the offset is +0560.

Figure 4. Sample IPCS output
 CPU STATUS:
 
  PSW=078C2000 84FD2830 (RUNNING IN PRIMARY, KEY 8, AMODE 31, DAT ON)
      DISABLED FOR PER
    ASID(X'0407') 04FD2830. EDGBKUP+0560 IN EXTENDED CSA
   ASCB1031 AT FBB380, JOB(DFRMM), FOR THE HOME ASID
   ASXB1031 AT 8FE038 FOR THE HOME ASID. NO BLOCK IS DISPATCHED
   HOME ASID: 0407 PRIMARY ASID: 0407 SECONDARY ASID: 0407

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014